Results 61 to 70 of about 164 (126)

Feistel Ciphers with L 2-Decorrelation [PDF]

open access: yes, 1999
Recently, we showed how to strengthen block ciphers by decorrelation techniques. In particular, we proposed two practical block ciphers, one based on the GF(2n)-arithmetics, the other based on the x mod p mod 2n primitive with a prime p = 2n(1 + δ). In this paper we show how to achieve similar decorrelation with a prime p = 2n(1 - δ).
openaire   +1 more source

AKF: A key alternating Feistel scheme for lightweight cipher designs

open access: yesInformation Processing Letters, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Karakoc, F.   +2 more
openaire   +2 more sources

Comprehensive Analysis of Lightweight Cryptographic Algorithms for Battery‐Limited Internet of Things Devices

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2025, Issue 1, 2025.
The growth of billions of devices functioning in resource‐constrained situations in the Internet of Things (IoT) era poses serious security issues. As a result of their limited processing power efficiency, memory, and battery life, traditional cryptographic algorithms like elliptic curve cryptography (ECC), Rivest–Shamir–Adleman (RSA), and Advanced ...
Nahom Gebeyehu Zinabu   +4 more
wiley   +1 more source

Design Trends and Comparative Analysis of Lightweight Block Ciphers for IoTs

open access: yesApplied Sciences
This paper provides a comprehensive survey of 58 lightweight block ciphers (LWBCs) introduced between 2018 and 2025, designed specifically for securing resource-constrained environments such as the Internet of Things (IoTs).
Safia Meteb Al-Nofaie   +2 more
doaj   +1 more source

Multi‐Scale Soil Salinization Dynamics From Global to Pore Scale: A Review

open access: yesReviews of Geophysics, Volume 62, Issue 4, December 2024.
Abstract Soil salinization refers to the accumulation of water‐soluble salts in the upper part of the soil profile. Excessive levels of soil salinity affects crop production, soil health, and ecosystem functioning. This phenomenon threatens agriculture, food security, soil stability, and fertility leading to land degradation and loss of essential soil ...
Nima Shokri   +2 more
wiley   +1 more source

A literature review on V2X communications security: Foundation, solutions, status, and future

open access: yesIET Communications, Volume 18, Issue 20, Page 1683-1715, December 2024.
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying   +3 more
wiley   +1 more source

Links between Quantum Distinguishers Based on Simon’s Algorithm and Truncated Differentials

open access: yesIACR Transactions on Symmetric Cryptology
In this paper, we study the quantum security of block ciphers based on Simon’s period-finding quantum algorithm. We explored the relations between periodic functions and truncated differentials. The basic observation is that truncated differentials with
Zejun Xiang   +7 more
doaj   +1 more source

Research on Block Cipher Technology [PDF]

open access: yesITM Web of Conferences
With the rapid advancement of information technology, Humanity will enter the era of the Internet of Things, with billions of IoT devices connected to the network, and network attacks targeting user privacy, network environment, etc.
Yin Yuanhao
doaj   +1 more source

Integral attack on MIBS block cipher

open access: yesTongxin xuebao, 2014
The security of the block cipher MIBS against integral attack was analyzed and a 5-round distinguisher of MIBS was founded. Considering the equivalent structure of Feistel structure and the relation of master key and round key in the key expansion ...
Zhi-shu PAN   +3 more
doaj   +2 more sources

Generalized Feistel Ciphers for Efficient Prime Field Masking

open access: yes
A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential to improve the efficiency vs. security tradeoff of masked implementations against side-channel attacks, espe- cially in contexts where physical leakages show low noise. We pick up on the main open challenge that this seed result leads to, namely the design of an
Lorenzo Grassi   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy